General

  • Target

    74d52b94dbe44e83459e097ea1a1d22631a78bffa24ccf8ecc5492e9af9091a2.exe

  • Size

    583KB

  • Sample

    240912-h2g37sxdpr

  • MD5

    62eab9f468c6599a5a972c3fd1d5aaa4

  • SHA1

    3c8fcdfcc78ea26feb6a51542456fdc9891719cf

  • SHA256

    74d52b94dbe44e83459e097ea1a1d22631a78bffa24ccf8ecc5492e9af9091a2

  • SHA512

    2f05c63b93e3e2c7ef6e7fa7940aef02980520fc511b79f29aedb1b3aed69d5490d3b4d40bed9b5718794b3fa2e5ced85f5811a2666acf89fafac3439ebdb6c8

  • SSDEEP

    12288:TBIJsQZOIPSaJbib6+LBgIlfQORq6vzuOCCn:yJsQQIPS99gIlfQL+zwCn

Malware Config

Targets

    • Target

      74d52b94dbe44e83459e097ea1a1d22631a78bffa24ccf8ecc5492e9af9091a2.exe

    • Size

      583KB

    • MD5

      62eab9f468c6599a5a972c3fd1d5aaa4

    • SHA1

      3c8fcdfcc78ea26feb6a51542456fdc9891719cf

    • SHA256

      74d52b94dbe44e83459e097ea1a1d22631a78bffa24ccf8ecc5492e9af9091a2

    • SHA512

      2f05c63b93e3e2c7ef6e7fa7940aef02980520fc511b79f29aedb1b3aed69d5490d3b4d40bed9b5718794b3fa2e5ced85f5811a2666acf89fafac3439ebdb6c8

    • SSDEEP

      12288:TBIJsQZOIPSaJbib6+LBgIlfQORq6vzuOCCn:yJsQQIPS99gIlfQL+zwCn

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks